Exam 26: Data Breaches

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Which of the following should be done by employees to protect against data breaches?

Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
Verified

D

Decisions on how to respond to a data breach are most effective if they are made when the breach is happening.

Free
(True/False)
4.8/5
(36)
Correct Answer:
Verified

False

________ are software or procedures used to prevent an information security attack.

Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
Verified

B

Which of the following regulatory laws requires data protection for financial institutions?

(Multiple Choice)
4.8/5
(29)

Stolen credit card information is validated through a process called carding.

(True/False)
4.9/5
(32)

The purpose of a business continuity planning session in an organization is to ________.

(Multiple Choice)
4.9/5
(34)

Which of the following is true of the measures to be taken by an organization in the event of a data breach?

(Multiple Choice)
4.8/5
(27)

It is easier for organizations to prepare a list of countermeasures against many different types of attacks and take appropriate measures accordingly.

(True/False)
5.0/5
(36)

A group of hackers use a targeted phishing attack to breach a company's firewalls and hack into its security system.Which of the following techniques have the hackers used?

(Multiple Choice)
4.9/5
(37)

Explain the basic countermeasures to be taken by organizations to protect themselves against data breaches.

(Essay)
4.8/5
(28)

Venclave Hospital is a privately-owned organization that specializes in treating neurological diseases.Which of the following regulatory laws governs the data security measures to be taken by this hospital for protecting against data breach?

(Multiple Choice)
4.8/5
(31)

A(n)________ is said to happen when an unauthorized person views,alters,or steals secured data.

(Multiple Choice)
4.9/5
(27)

The Federal Information Security Management Act (FISMA)details the procedures to be followed by a federal agency in case an organization fails to ensure the minimum security requirements for its data and systems.

(True/False)
4.9/5
(35)

________ refers to the process of placing a small charge on a credit card to ensure it is working.

(Multiple Choice)
4.7/5
(20)

An organization can easily stop a simple SQL injection attack on its online store by additional user training,stronger vendor authentication,or an internal network intrusion detection system.

(True/False)
4.8/5
(30)

Explain how data breach occurs with an example.

(Essay)
4.7/5
(43)

Data extrusion helps organizations secure their data from possible data breaches.

(True/False)
4.8/5
(30)

Personally identifiable information includes a person's bank account numbers,personal identification numbers,email address,and social security numbers.

(True/False)
4.9/5
(33)

List some of the regulatory laws that govern the secure storage of data in certain industries.

(Essay)
4.8/5
(29)

Spear phishing is used by organizations to monitor traffic passing through their internal network.

(True/False)
4.8/5
(36)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)